Cisco Explorer 4700 Installation Guide Page 156

  • Download
  • Add to my manuals
  • Print
  • Page
    / 648
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 155
5-20
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 5 Configuring Virtual Servers
Configuring Virtual Servers
Click Cancel to exit this procedure without saving your entries.
Related Topics
Configuring Virtual Servers, page 5-2
Configuring Virtual Server Properties, page 5-10
Configuring Virtual Server Protocol Inspection
Configuring protocol inspection allows the virtual server to verify protocol behavior and identify
unwanted or malicious traffic passing through the ACE appliance.
In the Advanced View, protocol inspection configuration is available for the following virtual server
protocol configurations:
TCP with FTP, HTTP, HTTPS, RTSP, or SIP
UDP with DNS or SIP
In the Basic View, protocol inspection configuration is available for TCP with FTP.
Use this procedure to configure protocol inspection on a virtual server.
Assumption
A virtual server has been configured to use one of the protocols that supports protocol inspection in the
Properties configuration subset. See the “Configuring Virtual Server Properties” section on page 5-10
for information on configuring these protocols.
Procedure
Step 1 Select Config > Virtual Contexts > context > Load Balancing > Virtual Servers. The Virtual Servers
table appears.
Step 2 Select the virtual server that you want to configure for protocol inspection, and then click Edit. The
Virtual Server configuration screen appears.
Step 3 Click Protocol Inspection. The Enable Inspect check box appears.
Step 4 Check the Enable Inspect check box to enable inspection on the specified traffic. Clear this check box
to disable inspection on this traffic. By default, ACE appliances allow all request methods.
Step 5 If you checked the Enable Inspect check box, configure additional inspection options according to
virtual server application protocol configuration:
For DNS, in the Length field enter the maximum length of the DNS packet in bytes. Valid entries
are from 512 to 65535 bytes. If you do not enter a value in this field, the DNS packet size is not
checked.
For FTP, continue with Step 6.
For HTTP and HTTPS, continue with Step 7.
For SIP, continue with Step 9.
Note There are no protocol-specific inspection options for RTSP.
Page view 155
1 ... 155 156 157 ... 648

Comments to this Manuals

No comments